// For flags

CVE-2025-30691

openjdk: Improve compiler transformations (Oracle CPU 2025-04)

Severity Score

4.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

This update for java-1_8_0-openjdk fixes the following issues. Update to version jdk8u452 unauthorized creation, deletion or modification of critical data through the JSSE component. Unauthorized update, insert or delete access to a subset of Oracle Java SE data through the Compiler component. Unauthorized access to Oracle Java SE data and unauthorized ability to cause partial DoS through the 2D component. Javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java failed intermittently due to SSLException: Tag mismatch. Wrong format parameter in create_emergency_chunk_path. Enable debug log for SSLEngineExplorerMatchedSNI.java. XML Transformer outputs Unicode supplementary character incorrectly to HTML. Jarsigner should print a warning if an entry is removed. Clarify JarInputStream behavior. Update Timezone Data to 2024b. Improve parsing of Day/Month in tzdata rules clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract. Harden TzdbZoneRulesCompiler against missing zone names. Enhance Deflater operations. Distrust TLS server certificates anchored by Camerfirma Root CAs. Enhance jar file support. Update Timezone Data to 2025a. [8u] sun/management/jmxremote/startstop/JMXStartStopTest.java fails after backport of JDK-8066708. [8u] update TzdbZoneRulesCompiler to ignore HST/EST/MST links. Zone.tab update missed in 2025a backport. XCG currency code not recognized in JDK 8u.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-03-25 CVE Reserved
  • 2025-04-15 CVE Published
  • 2025-04-19 CVE Updated
  • 2025-06-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle Corporation
Search vendor "Oracle Corporation"
Oracle Java SE
Search vendor "Oracle Corporation" for product "Oracle Java SE"
21.0.6
Search vendor "Oracle Corporation" for product "Oracle Java SE" and version "21.0.6"
en
Affected
Oracle Corporation
Search vendor "Oracle Corporation"
Oracle Java SE
Search vendor "Oracle Corporation" for product "Oracle Java SE"
24
Search vendor "Oracle Corporation" for product "Oracle Java SE" and version "24"
en
Affected